CN101236673B - Method for accomplishing electronic purse off-line charging, complex function card and authorization carrier - Google Patents

Method for accomplishing electronic purse off-line charging, complex function card and authorization carrier Download PDF

Info

Publication number
CN101236673B
CN101236673B CN2008101015901A CN200810101590A CN101236673B CN 101236673 B CN101236673 B CN 101236673B CN 2008101015901 A CN2008101015901 A CN 2008101015901A CN 200810101590 A CN200810101590 A CN 200810101590A CN 101236673 B CN101236673 B CN 101236673B
Authority
CN
China
Prior art keywords
authorization
data
transaction data
transaction
carrier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN2008101015901A
Other languages
Chinese (zh)
Other versions
CN101236673A (en
Inventor
王军
高翔
王国荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Watchdata Ltd By Share Ltd
Original Assignee
Beijing WatchData System Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing WatchData System Co Ltd filed Critical Beijing WatchData System Co Ltd
Priority to CN2008101015901A priority Critical patent/CN101236673B/en
Publication of CN101236673A publication Critical patent/CN101236673A/en
Application granted granted Critical
Publication of CN101236673B publication Critical patent/CN101236673B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The present invention discloses a method of realizing electronic wallet off-line charging, which relates to the communication field or computer field and provides convenience for users to charge electronic wallets under off-line circumstances. The method of the present invention comprises the steps of acquiring transaction data determined according to the characteristic data of authorization carriers through a terminal unit and charging electronic wallets according to the transaction data. As the embodiment of the present invention ensures that users can charge electronic wallets under off-line circumstances rather than go to institutions appointed by authorization centers to charge electronic wallets under on-line circumstances, the method can support safe and flexible charging modes for electronic wallets and achieve the objective of increasing application selections of operation business and providing convenience for user in application. The present invention also discloses a composite functional card, an authorization carrier and a terminal unit.

Description

Method for realizing electronic purse off-line charging, composite function card and authorization carrier
Technical Field
The invention relates to the field of communication or computers, in particular to a technology for realizing recharging of an electronic wallet.
Background
In recent years, the development of mobile communication networks and technologies brings prosperity to the mobile value-added service industry, and enriches the functions of handheld terminal equipment, such as mobile phone televisions. Along with this, due to the wide range of value-added service users, the problem that the value-added service operators charge service fees to their users is increasingly prominent.
With the promulgation and popularization of the "Integrated Circuit (IC) card specification for chinese finance and the" application technology for construction industry IC (IC) card ", the IC card with the function of electronic wallet is widely used to solve the problems of collecting fees for operators and paying fees for users. However, according to the existing standard, the electronic purse of the integrated circuit card only supports the online recharging mode. The online recharging mode is that the recharging device needs to perform online operation with an authorization center when performing each recharging transaction on the electronic wallet. The operation process is as follows:
the recharging device sends a recharging transaction request to the authorization center to request the recharging transaction of the electronic wallet of the user, wherein the request carries the related information and the transaction address information of the electronic wallet user; the authorization center checks the validity of the user account, records the transaction address and returns the information required for completing the recharging transaction; the recharging device completes the recharging transaction according to the information returned by the authorization center.
The above online operation requires the user to go to a designated organization having a recharging device capable of being networked with the authorization center to recharge the electronic wallet, which brings inconvenience to the user.
Disclosure of Invention
The invention provides a method for realizing offline recharging of an electronic wallet, a composite function card, an authorization carrier and terminal equipment, so that a user can recharge the electronic wallet in an offline condition, and convenience is brought to the user.
The embodiment of the invention is realized by the following technical scheme:
the embodiment of the invention provides a method for realizing offline recharging of an electronic wallet, which comprises the following steps:
the method comprises the steps that a composite function card obtains transaction data determined according to feature data of an authorized carrier;
the composite function card charges the electronic wallet according to the transaction data;
and after the transaction data is determined by successfully using the characteristic data of the authorization carrier, invalidating the characteristic data corresponding to the transaction data.
An embodiment of the present invention further provides a composite function card, including:
the acquisition unit is used for acquiring the transaction data determined according to the characteristic data of the authorized carrier;
the recharging unit is used for recharging the electronic wallet according to the transaction data; and after the transaction data is determined by successfully using the characteristic data of the authorized carrier, invalidating the characteristic data corresponding to the transaction data.
The embodiment of the invention also provides an authorization carrier, which comprises:
the transaction data determining unit is used for determining transaction data according to local characteristic data;
the transmission unit is used for transmitting the transaction data to the electronic wallet through the terminal equipment for recharging;
the authorization carrier further comprises:
and the data processing unit is used for invalidating the characteristic data corresponding to the transaction data after the transaction data is determined by successfully using the characteristic data of the authorization carrier.
An embodiment of the present invention further provides a terminal device, where the terminal device includes:
the acquisition unit is used for acquiring the transaction data determined according to the characteristic data of the authorized carrier;
the transmission unit is used for transmitting the transaction data obtained by the acquisition unit to the composite function card for recharging the electronic wallet; and when the transaction data is successfully determined by using the characteristic data of the authorized carrier, invalidating the characteristic data corresponding to the transaction data.
According to the technical scheme of the method for realizing the offline recharging of the electronic wallet, provided by the embodiment of the invention, the transaction data determined according to the characteristic data of the authorization carrier is obtained through the terminal equipment; and recharging the electronic wallet according to the transaction data. The embodiment of the invention can charge the electronic wallet by the user under the offline condition, thereby being convenient for the user to use.
Drawings
FIG. 1 is a flow chart of a first embodiment of the present invention;
FIG. 2 is a flow chart of a first application of the first embodiment of the present invention;
FIG. 3 is a flow chart of a second application of the first embodiment of the present invention;
FIG. 4 is a schematic structural diagram of a second embodiment of the present invention;
FIG. 5 is a schematic structural diagram of a third embodiment of the present invention;
fig. 6 is a schematic structural diagram of a fourth embodiment of the present invention.
Detailed Description
In the embodiment of the invention, when a user receives the service provided by an operator through terminal equipment (such as a mobile communication mobile phone, a personal media player, a PDA, a vehicle-mounted/ship-mounted/airborne terminal, a notebook computer and the like), the user can interact with a composite function card with an electronic wallet through the terminal equipment (such as a mobile television mobile phone) to pay service fee to the operator. When the balance of the electronic purse in the composite function card is insufficient, the user can go to the authorized carrier agency to purchase the authorized carrier with the required face value (such as a rechargeable card, and the authorized carrier is issued to the legal agency by an authorization center (such as a bank) according to the charging requirement of an operator). Then, transaction data is determined according to the characteristic data recorded in the authorization carrier, and the electronic wallet in the composite function card is charged by using the transaction data. The following describes implementation of specific embodiments of the present invention with reference to the drawings.
A first embodiment of the present invention provides a method for implementing offline recharging of an electronic wallet, and a specific implementation process thereof, as shown in fig. 1, includes the following contents:
step 101, acquiring, by a terminal device, transaction data determined according to characteristic data of an authorized carrier.
In step 101, transaction data may be obtained through a terminal device.
The user can make a call (or other contact ways) to the authorization center through the terminal equipment or other terminal equipment, the authorization carrier characteristic data held by the user is informed to the authorization center, and the authorization center determines transaction data according to the authorization carrier characteristic data and informs the user; after the user obtains the transaction data, the transaction data are input into the terminal device, and the terminal device forwards the transaction data to the electronic wallet, so that the electronic wallet can obtain the transaction data transmitted by the terminal device.
The user can also make a call (or other contact ways) to the authorization center through the terminal equipment or other terminal equipment, and the authorization center is informed of the transaction process data reported by the authorization carrier (the transaction process data is determined by the authorization carrier according to the local characteristic data) acquired by the user through the terminal equipment; the authorization center determines transaction data according to the transaction process data and informs the user of the transaction data; after the user obtains the transaction data, the transaction data are input into the terminal device, and the terminal device forwards the transaction data to the electronic wallet, so that the electronic wallet can obtain the transaction data transmitted by the terminal device.
The user can also make a call (or other contact ways) to the authorization center through the terminal equipment or other terminal equipment, the authorization center is informed of the characteristic data of the authorization carrier held by the user, and the authorization center determines the transaction data according to the characteristic data of the authorization carrier; the authorization center can also determine a corresponding Electronic Purse application serial number (EPID) according to the user ID number (or the ID number of the user terminal), and determine the terminal device installed with the corresponding Electronic Purse according to the EPID, the authorization center can directly send the generated transaction data to the determined terminal device, and the terminal device forwards the transaction data to the Electronic Purse, so that the Electronic Purse can obtain the transaction data transmitted by the terminal device.
In step 101, transaction data determined by the authorization carrier according to the local feature data may also be acquired from the authorization carrier through the terminal device. For example, an application request is sent to the authorization carrier by the terminal device, and transaction data determined by the authorization carrier according to the local characteristic data is obtained according to the response of the authorization carrier.
The characteristic data can be transaction amount, or transaction amount and random number generated by the authorization carrier; or may simply be the card serial number.
The generated transaction data includes a transaction amount.
In order to ensure the safety of the recharging transaction, the terminal equipment can interact with the composite function card to verify the legality of the composite function card. Before the authorization carrier determines the transaction data according to the local characteristic data, the validity of the composite function card can be verified through the authorization carrier; or after the authorization carrier reports the characteristic data or the transaction process data, the authorization center verifies the validity of the composite function card.
The process of verifying the validity of the composite function card through the authorization carrier specifically comprises the following steps:
the composite function card obtains the random number (namely the random number of the authorized carrier), the recharging transaction serial number, the key version number, the algorithm identification and the application serial number of the authorized carrier, which are generated by the authorized carrier by the composite function card, from the authorized carrier through the terminal equipment; the composite function card selects a corresponding main key according to the algorithm corresponding to the algorithm identifier and the key version number; using the master key to perform decentralized processing on the application serial number of the authorization carrier to obtain a sub-key corresponding to the authorization carrier; the composite function card calculates the sub-secret key according to the algorithm corresponding to the algorithm identification by using the random number (namely the composite function card random number) and the authorization carrier random number which are automatically generated by the composite function card, and generates a process secret key; and calculating the internal data of the composite function card by using the process key to obtain the identity verification code of the composite function card. And the composite function card sends the composite function card identity verification code, the composite function card random number used for generating the composite function card identity verification code and the composite function card off-line transaction serial number to an authorization carrier through terminal equipment.
And the authorization carrier obtains the composite function card identity verification code generated by the composite function card, the composite function card random number used for generating the composite function card identity verification code and the composite function card offline transaction serial number through the terminal equipment. And the authorization carrier calculates a designated sub-secret key in the authorization carrier by using the authorization carrier random number taken out from the authorization carrier and the composite function card random number to generate a process secret key, and performs validity verification on the composite function card identity verification code by using the process secret key.
The validity of the composite function card is verified by the authorization center in a manner similar to that described above and will not be described in detail herein.
In order to ensure the security of the recharging transaction, the validity of the transaction data needs to be verified. Step 102 is executed to verify the validity of the transaction data. After the validity verification is confirmed, step 103 is executed, that is, the electronic wallet is recharged according to the transaction data. After the validity verification is determined not to pass, step 104 is executed, that is, the error times are updated according to the failure of the verification, whether the error times reach the set threshold value is judged, and when the error times reach the set threshold value, the electronic wallet is locked.
Step 102 may verify the transaction data obtained by the composite function card according to the transaction verification code generated by the authorization carrier, or may verify the transaction data obtained by the composite function card according to the transaction verification code generated by the authorization center.
The specific implementation process of verifying the transaction data obtained by the composite function card according to the transaction verification code generated by the authorization carrier is as follows:
and the authorization carrier calculates the appointed sub-secret key by using the random number of the composite function card and the random number of the authorization carrier according to the algorithm corresponding to the algorithm identifier to generate a process secret key, and calculates the transaction data by using the process secret key to obtain the transaction verification code of the transaction data. Before recharging the electronic wallet, the composite function card obtains transaction data generated according to the characteristic data of the authorization carrier and a transaction verification code of the transaction data through the terminal equipment; and calculating a designated key by using the random number of the authorized carrier and the random number of the composite function card to generate a process key, and performing validity verification on the transaction verification code of the transaction data by using the process key to realize validity verification on the transaction data.
The process of verifying the transaction data obtained by the composite function card according to the transaction verification code generated by the authorization center comprises the following steps: and the authorization center calculates the appointed sub-key according to the algorithm corresponding to the algorithm identification by using the ID number of the composite function card and the random number generated by the authorization center, generates a process key, and calculates the transaction data by using the process key to obtain the transaction verification code of the transaction data. Before recharging the electronic wallet, the composite function card obtains transaction data generated according to the characteristic data of the authorization carrier and a transaction verification code of the transaction data through the terminal equipment; and calculating a designated key by using the random number of the authorization center and the ID number of the composite function card to generate a process key, and performing validity verification on the transaction verification code of the transaction data by using the process key to realize validity verification on the transaction data.
In order to further ensure the safety of the recharging transaction, the legality of the authorization carrier can be further verified through the composite function card, or the legality of the authorization carrier can be verified through an authorization center.
The process of verifying the validity of the authorization carrier through the composite function card specifically comprises the following steps:
the method comprises the steps that a composite function card obtains an authorized carrier identity verification code generated by an authorized carrier through terminal equipment (the authorized carrier calculates a designated secret key by using a composite function card random number and an authorized carrier random number to generate a process secret key, and calculates internal information of the authorized carrier by using the process secret key to obtain the authorized carrier identity verification code), and generates the authorized carrier random number used by the authorized carrier identity verification code and the internal information (a rechargeable card transaction serial number, a secret key version number and an algorithm identification) of the authorized carrier; and generating a process key by using the random number of the composite function card and the random number of the authorized carrier, and carrying out validity verification on the authentication code of the authorized carrier by using the process key.
The procedure for verifying the legitimacy of an authorized carrier by an authorization centre, similar to the above, is not described in detail here.
After the recharging of the electronic wallet is completed through the steps, the composite function card can send a notification of the completion of the recharging operation to the terminal device, or the terminal device is not notified.
After the authorization center successfully uses the characteristic data of the authorization carrier to determine the transaction data and inform the user or the determined terminal equipment, the authorization center invalidates the characteristic data corresponding to the transaction data; or after the authorization carrier successfully uses the local characteristic data to determine the transaction data, the authorization carrier invalidates the characteristic data corresponding to the transaction data.
The authorization center deducts the transaction data after notifying the user or the determined terminal equipment of the transaction data determined according to the authorization carrier characteristic data (or the authorization carrier transaction process data) reported by the user; or, after the authorization carrier transmits the transaction data determined by the authorization carrier according to the local characteristic data to the terminal equipment, deducting the transaction data.
A specific application of the first embodiment of the present invention is given below by taking an authorized carrier as a rechargeable card, as shown in fig. 2, which includes the following contents:
and the terminal equipment sends a composite function card application selection request to the composite function card.
And the composite function card starts the corresponding application according to the application selection request and sends out the EPID.
And the terminal equipment receives the EPID sent by the composite function card and stores the EPID.
Likewise, the terminal device sends a rechargeable card application selection request to the rechargeable card.
And the rechargeable card starts the corresponding application according to the application selection request and sends out an application serial number (ID) of the rechargeable card.
And the terminal equipment receives the application serial number of the rechargeable card and stores the application serial number.
The terminal sends a wallet balance reading request to the rechargeable card.
The rechargeable card responds to the wallet balance reading request and returns the wallet balance of the rechargeable card.
And the terminal equipment receives the wallet balance returned by the rechargeable card and temporarily saves the wallet balance.
The terminal equipment sends a random number acquisition request to the composite function card; the multifunction card returns a 4-byte random number (denoted as RAND1) in response to the random number acquisition request, and stores the random number.
And the terminal equipment receives the random number sent by the composite function card and temporarily stores the random number.
The terminal device takes the received wallet balance in the rechargeable card, the random number (recorded as RAND1) and the EPID obtained from the composite function card as a command data field, and sends an initialization of withdrawal (Initialize For unlock) command to the rechargeable card, wherein the command data field is carried.
After receiving the withdrawal initialization command, the rechargeable card judges whether the transaction amount is less than or equal to the original balance, and if the transaction amount does not meet the conditions, error information is sent out; if the condition is met, 4 bytes of random numbers (recorded as RAND2) are taken from the rechargeable card, form a dispersion factor together with RAND1, calculate the appointed money-taking sub-Key by using the dispersion factor to generate a process Key (SK), and then calculate corresponding data in the table 1 by using the SK according to a Message Authentication Code (MAC) calculation method to generate MAC 1.
TABLE 1
The rechargeable card sends out related data such as the balance of the rechargeable card, the adopted algorithm identification, a 4-byte random number (RAND2) of the rechargeable card, MAC1, a transaction serial number (which is carried when the rechargeable card is issued in the background) of the rechargeable card, a key version number (which is carried when the rechargeable card is issued in the background), and the like.
The terminal equipment takes the received related data and the application serial number of the rechargeable card as a data field of the command, and sends a recharge initialization (initialization for Load) command to the composite function card, wherein the recharge initialization command carries the related data and the application serial number of the rechargeable card.
After the composite function card receives the recharging initialization command, selecting the same calculation algorithm as the recharging card according to the algorithm identification in the related data; and using the calculation algorithm to perform the following calculation:
selecting a designated recharging main key according to the key version number in the related data carried in the recharging main key; judging whether the appointed recharging main key is valid or not according to the current state identification of the recharging main key, if so, using the corresponding recharging main key to perform decentralized processing on the application serial number of the rechargeable card to obtain a recharging sub-key corresponding to the rechargeable card; forming a dispersion factor by using a 4-byte random number RAND2 on the rechargeable card in related data and RAND1, and calculating the rechargeable sub-key by using the dispersion factor to generate the same process key SK; verifying the validity of the MAC1 by using the process key SK, and if the verification fails, sending error information; if the verification passes, the corresponding data as shown in Table 2 is calculated using the process key SK, resulting in MAC 2. If the appointed recharging main key is invalid, the composite function card sends out error information.
TABLE 2
Figure GFW00000039105900091
The complex function card sends its offline recharge transaction number and the generated MAC2 to the terminal device.
The terminal equipment takes the received offline recharging transaction serial number and MAC2 data of the composite function card as a data field of a command, and sends a withdrawal (Debit For Unload) command to the recharging card, wherein the withdrawal command carries the data field.
After receiving the withdrawal command, the prepaid card verifies the correctness of MAC2 using process key SK. If the verification is passed, clearing the balance of the wallet, namely invalidating the characteristic data of the rechargeable card; the transaction detail record is updated, and the transaction detail record shown in table 3 is updated.
TABLE 3
Figure GFW00000039105900092
Figure GFW00000039105900101
The rechargeable card calculates corresponding data shown in table 4 by using the process key SK to obtain 4-byte MAC 3; the corresponding data shown in table 5 is calculated by using the result of the xor operation of the left and right 8 bytes of the internal key (which carries this information when the rechargeable card is issued in the background), and a Transaction Authentication Code (TAC) of 4 bytes is obtained.
TABLE 4
Figure GFW00000039105900102
TABLE 5
Figure GFW00000039105900103
The rechargeable card sends the MAC3 and TAC code out of the card.
The terminal device takes the received MAC3 and TAC code data as a data field of the command, and sends a recharge command (Credit For Load) to the composite function card, wherein the recharge command carries the data field.
After the compound function card receives the recharging command, the MAC3 is verified by using the process key SK, if the MAC3 is verified successfully, the transaction amount is added to the balance of the associated electronic wallet, the transaction detail record shown in the table 6 is updated, the offline recharging transaction serial number is added by 1, and confirmation information is sent to the terminal, otherwise, the compound function card subtracts 1 from the count value of the application error counter, and when the count value of the counter is 0, the compound function card is locked.
The composite function card temporarily stores the TAC code and provides the TAC code to a background in the follow-up process so that the background can verify the transaction.
TABLE 6
Figure GFW00000039105900111
The terminal device receives the confirmation information.
A second specific application of the first embodiment of the present invention is given below by taking an authorized carrier as a rechargeable card, as shown in fig. 3, which includes the following contents:
and the terminal equipment sends a composite function card application selection request to the composite function card.
And the composite function card starts the corresponding application according to the application selection request and sends out the serial number of the electronic wallet application, namely the EPID.
And the terminal equipment receives the EPID sent by the composite function card and stores the EPID.
Likewise, the terminal device sends a rechargeable card application selection request to the rechargeable card.
And the rechargeable card starts corresponding application according to the application selection request and sends out a rechargeable card application serial number, namely the rechargeable card application ID.
And the terminal equipment receives the application serial number of the rechargeable card and stores the application serial number.
The terminal device sends a wallet balance reading request to the rechargeable card.
The rechargeable card responds to the wallet balance reading request, and returns the wallet balance and the internal information of the rechargeable card in the rechargeable card, including an algorithm identifier, a rechargeable card transaction serial number (which is carried when the rechargeable card is issued in the background) and a key version number (which is carried when the rechargeable card is issued in the background).
And the terminal equipment receives the balance of the wallet returned by the rechargeable card and the internal information of the rechargeable card and temporarily stores the balance of the wallet and the internal information of the rechargeable card.
The terminal equipment sends a random number acquisition request to the rechargeable card;
the rechargeable card responds to the random number acquisition request, returns a 4-byte random number (denoted as RAND1), and stores the random number.
And the terminal equipment receives the random number sent by the rechargeable card and temporarily stores the random number.
The terminal device sends a recharging initialization command to the composite function card by taking the received related data (including the balance of the rechargeable card, the algorithm identification, the 4-byte random number (namely RAND1) of the rechargeable card, the transaction serial number and the key version number of the rechargeable card corresponding to the rechargeable card) and the application serial number (namely the application ID of the rechargeable card) of the rechargeable card as a data field of the command, wherein the recharging initialization command carries the related data and the application serial number (namely the application ID of the rechargeable card).
After the composite function card receives the recharging initialization command, the data items in the related data are stored; selecting the same calculation algorithm as the recharging card according to the algorithm identification in the related data; and using the calculation algorithm to perform the following calculations:
selecting a designated recharging main key according to the key version number in the related data carried in the recharging main key; judging whether the appointed recharging main key is valid or not according to the current state identification of the recharging main key, if so, using the corresponding recharging main key to perform decentralized processing on the application serial number of the rechargeable card to obtain a recharging sub-key corresponding to the rechargeable card; taking 4 bytes random number (denoted as RAND2) on the composite function card, forming a dispersion factor together with RAND1, calculating the charging subkey by using the dispersion factor, generating a process key SK, and then performing MAC calculation on corresponding data shown in Table 2 by using the SK to generate MAC 1. If the appointed recharging main key is invalid, the composite function card sends out error information.
The complex function card sends its offline recharge transaction number, the 4-byte random number (i.e., RAND2) on the complex function card, and the generated MAC1 to the terminal device.
The terminal device takes the received offline recharging transaction serial number of the composite function card, the 4-byte random number (namely RAND2) on the composite function card and the MAC1 data as a data field of a command, and sends a withdrawal command to the recharging card, wherein the withdrawal command carries the data field.
After receiving the withdrawal command, the rechargeable card judges whether the transaction amount is less than or equal to the original balance, and if the transaction amount does not meet the condition, error information is sent out; if the condition is satisfied, a 4-byte random number RAND2 of the composite function card is used to form a dispersion factor together with RAND1, the same process key SK is generated by calculating the appointed withdrawal sub-key by using the dispersion factor, and the correctness of the MAC1 is verified by using the process key SK. If the verification is passed, clearing the balance of the wallet, namely invalidating the characteristic data of the rechargeable card; the transaction detail record is updated, and the transaction detail record shown in table 3 is updated.
The rechargeable card calculates corresponding data shown in table 4 by using the process key SK to obtain 4-byte MAC 2; the corresponding data as shown in table 5 is calculated by using the result of the xor operation of the left and right 8 bytes of the internal key (which carries this information when the rechargeable card is issued in the background), so as to obtain the TAC code of 4 bytes.
The rechargeable card sends the MAC2 and TAC code out of the card.
The terminal device takes the received MAC2 and TAC code data as a data field of the command, and sends a recharging command to the composite function card, wherein the recharging command carries the data field.
After the compound function card receives the recharging command, the MAC2 is verified by using the process key SK, if the MAC2 is verified successfully, the transaction amount is added to the balance of the associated electronic wallet, the transaction detail record (comprising the transaction amount, the transaction type identifier, the transaction sequence number of the rechargeable card, the application ID of the rechargeable card, the offline recharging transaction sequence number and the TAC code.) shown in the table 6 is updated, the offline recharging transaction sequence number is added with 1, and confirmation information is sent to the terminal, otherwise, the compound function card subtracts 1 from the counter value of the application error counter, and when the counter value of the counter is 0, the compound function card is locked.
The composite function card temporarily stores the TAC code and provides the TAC code to a background in the follow-up process so that the background can verify the transaction.
The terminal device receives the confirmation information.
A third specific application of the first embodiment of the present invention is given below, which includes the following:
in the first step, the user goes to the voucher card affiliate to purchase a voucher card of the desired value.
In the second step, the user connects (e.g. makes a call or sends a short message) to the authorization center, and provides the feature data recorded on the rechargeable card, such as the card serial number recorded on the rechargeable card, and the user ID number (or the ID number of the user terminal) (corresponding to the composite function card electronic wallet application serial number EPID) to the authorization center.
And thirdly, the authorization center verifies the correctness of the characteristic data and the ID, if the characteristic data and the ID are correct, the corresponding transaction amount is determined according to the characteristic data, and the transaction data and the transaction verification code are generated according to the ID, the transaction amount, the transaction type, the algorithm identification, the key version, the transaction date (the current date which is used for judging whether the key in the composite function card is valid) and the random number.
The authorization center can also determine the corresponding EPID according to the user ID number (or the ID number of the user terminal), and determine the terminal equipment provided with the corresponding electronic wallet according to the EPID.
Fourthly, the authorization center returns the transaction data and the transaction verification code to the user; after receiving the transaction data and the transaction verification code, the user inputs the obtained transaction data and the transaction verification code into the terminal device through an input device (such as a keyboard), and the terminal device forwards the transaction data and the transaction verification code to the composite function card.
The authorization center can directly send the generated transaction data and the transaction verification code to the determined terminal equipment, and the terminal equipment forwards the transaction data and the transaction verification code to the composite function card.
And the authorization center invalidates the characteristic data corresponding to the transaction data by setting an invalid identifier for the characteristic data corresponding to the transaction data.
Fifthly, the composite function card checks the validity of the key specified by the key version according to the transaction date in the transaction data, when the specified key is found to be valid, the specified key is used for verifying the validity of the transaction verification code according to the algorithm corresponding to the specified algorithm identifier, and when the transaction verification code is found to be valid, the transaction amount in the transaction data is recharged to the electronic wallet; taking a random number, and calculating the data in the table 7 to obtain a recharging success verification code; the transaction record details shown in table 8 are updated and the offline recharge transaction number is incremented by 1.
TABLE 7
Figure GFW00000039105900141
TABLE 8
Figure GFW00000039105900142
Figure GFW00000039105900151
The composite function card temporarily stores the TAC code and provides the TAC code to an authorization center in the follow-up process so that the authorization center can verify the transaction.
A second embodiment of the present invention provides a composite function card, which has a structure as shown in fig. 4, and includes: the device comprises an acquisition unit, a recharging unit, an authentication unit, an updating unit, a judging unit, a locking unit and a notification unit.
The acquisition unit is used for acquiring the transaction data determined according to the characteristic data of the authorized carrier; the acquiring unit may further include: a first acquisition subunit, a second acquisition subunit, a third acquisition subunit, a fourth acquisition subunit, or a fifth acquisition subunit.
The first obtaining subunit is used for obtaining transaction data input by a user through terminal equipment, wherein the transaction data is determined by an authorization center according to authorized carrier characteristic data reported by the user and is notified to the user by the authorization center;
the second acquiring subunit is used for acquiring the transaction data sent by the authorization center through the terminal equipment, wherein the transaction data is determined by the authorization center according to the authorization carrier characteristic data reported by the user and is sent to the terminal equipment by the authorization center; the terminal equipment is determined by the authorization center according to the identification information of the user or the identification information of the terminal equipment reported by the user;
the third acquiring subunit is used for acquiring transaction data input by a user through terminal equipment, wherein the transaction data is determined by an authorization center according to authorization carrier transaction process data reported by the user and is notified to the user by the authorization center, and the transaction process data is determined by an authorization carrier according to local characteristic data;
the fourth acquiring subunit is configured to acquire, by the terminal device, transaction data sent by the authorization center, where the transaction data is determined by the authorization center according to authorized carrier transaction process data reported by a user and is sent to the terminal device by the authorization center; the transaction process data is determined by the authorization carrier according to local characteristic data; the terminal equipment is determined by the authorization center according to the identification information of the user or the identification information of the terminal equipment reported by the user;
or,
the fifth obtaining subunit is configured to obtain, from the authorization carrier through the terminal device, the transaction data determined by the authorization carrier according to the local feature data.
The recharging unit is used for recharging the electronic wallet according to the transaction data.
The composite function card further comprises an authentication unit used for carrying out validity verification on the transaction data and triggering the recharging unit to work after the validity verification is confirmed to pass.
The authentication unit obtains a transaction verification code generated by an authorization carrier or an authorization center through terminal equipment (the authorization carrier calculates a designated sub-key by using a random number according to an algorithm corresponding to an algorithm identifier to generate a process key, and calculates a transaction quota value in the authorization carrier by using the process key to obtain the transaction verification code), and generates the random number used by the transaction verification code; and generating a process key by using the random number according to the same method, and carrying out validity verification on the transaction verification code by using the process key. And then the information that the transaction is legal is transmitted to the recharging unit.
The composite function card further comprises an updating unit used for updating the error times according to the verification failure when the authentication unit determines that the validity verification fails;
the composite function card further comprises a judging unit for judging whether the number of errors reaches a set threshold value;
the composite function card further comprises a locking unit used for locking the electronic wallet when the judging unit judges that the number of times of errors reaches a set threshold value.
The composite function card may further include: and the notification unit is used for sending a notification of completing the recharging operation to the terminal equipment after the recharging unit completes the recharging of the electronic wallet.
In order to ensure the security of the recharging transaction, the composite function card may further include: and the identity verification code generation unit is used for generating a composite function card identity verification code, and sending the composite function card identity verification code, the composite function card random number used for generating the composite function card identity verification code and the internal data of the composite function card to an authorization carrier or an authorization center through terminal equipment for verifying the identity validity of the composite function card. The processing condition for generating the identity verification code of the composite function card is as follows: selecting a corresponding recharging main key according to the algorithm corresponding to the algorithm identifier and the key version number; using the recharging main key to perform decentralized processing on the application serial number of the authorization carrier to obtain a recharging sub-key; calculating the recharging sub-key by using the random number of the composite function card and the random number of the authorized carrier to generate a process key; and calculating the internal data of the composite function card by using the process key to obtain the identity verification code of the composite function card.
In order to ensure the security of the recharging transaction, the composite function card may further include: an identity authentication unit used for obtaining an authorization carrier identity verification code generated by an authorization carrier through terminal equipment (the authorization carrier identity verification code is obtained by the authorization carrier through the following method that a composite function card random number and an authorization carrier random number are used for calculating a designated sub-secret key to generate a process secret key, and the process secret key is used for calculating internal data of the authorization carrier to obtain the authorization carrier identity verification code), and the authorization carrier random number used by the authorization carrier identity verification code is generated; selecting a corresponding recharging main key according to the key version number; using the recharging main key to perform decentralized processing on the application serial number of the authorization carrier to obtain a recharging sub-key; and calculating the recharging sub-key by using the random number of the composite function card and the random number of the authorized carrier to generate a process key, and performing validity verification on the authentication code of the authorized carrier by using the process key.
The composite function card may be a smart card conforming to ISO7816 series standards and "chinese financial integrated circuit card specification", and supports different Encryption algorithms, such as Data Encryption Standard (DES), 3DES, and/or Advanced Encryption Standard (AES), in which multiple sets of keys are stored and validity periods of use are set.
A third embodiment of the present invention provides an authorization carrier, the structure of which is shown in fig. 5, and the authorization carrier includes: a transaction data determination unit and a transmission unit. The authorization carrier may further comprise an application request processing unit. The authorization carrier may further comprise a data processing unit. The authorization carrier may further comprise a deduction unit.
The transaction data determining unit is used for determining transaction data according to local characteristic data; the transaction data may be non-encrypted transaction data; or may be encrypted data. And the transaction data determining unit is used for calculating the appointed secret key by using the random number of the composite function card and the random number of the authorization carrier according to the algorithm corresponding to the algorithm identification when generating the encrypted transaction data to generate a process secret key, and calculating the transaction value in the authorization carrier by using the process secret key to obtain the encrypted transaction data.
And the transmission unit is used for transmitting the transaction data to the electronic wallet through the terminal equipment for recharging.
The authorization carrier further comprises an application request processing unit, which is used for receiving an application request sent by the terminal equipment and triggering the transaction data determination unit to start according to the application request. Correspondingly, the transaction data determining unit may start a corresponding operation according to the trigger of the application request processing unit, or may start a corresponding operation in other manners.
The authorization carrier further comprises a data processing unit used for invalidating the characteristic data corresponding to the transaction data after the transaction data determining unit successfully uses the characteristic data of the authorization carrier to determine the transaction data. The specific implementation is the same as that described in relation to the first embodiment and will not be described in detail here.
The authorization carrier further comprises a deduction unit used for deducting the transaction data after the transmission unit successfully transmits the determined transaction data to the terminal equipment.
The deduction unit may further include: a judgment subunit and a limit deduction subunit.
The judgment subunit is used for judging whether the transaction data needing to be deducted is less than or equal to the locally stored quota value;
the credit deduction subunit is used for deducting the credit stored in the authorized carrier once when the judgment result of the judgment subunit is that the transaction data to be deducted is equal to the credit stored in the authorized carrier; if the judgment result of the judgment subunit is that the amount to be deducted is less than the amount stored in the authorized carrier, the amount deduction subunit supports multiple withdrawal operations on the fixed balance stored in the authorized carrier.
The authorization carrier may further include: and the verification code acquisition unit is used for acquiring the composite function card identity verification code generated by the composite function card, the composite function card random number used for generating the composite function card identity verification code and the composite function card internal data through the terminal equipment. The composite function card identity verification code can be obtained through the following modes: acquiring an authorized carrier random number, an algorithm identifier, a key version number and an authorized carrier application serial number from an authorized carrier through terminal equipment; identifying a corresponding algorithm according to the algorithm; selecting a corresponding recharging main key according to the key version number; using the recharging main key to perform decentralized processing on the application serial number of the authorization carrier to obtain a recharging sub-key; calculating the recharging sub-key by using the random number of the composite function card and the random number of the authorized carrier to generate a process key; and calculating the internal data of the composite function card by using the process key to obtain the identity verification code of the composite function card.
Accordingly, the authorization carrier may further include: and the identity authentication unit is used for generating a process key by using the authorization carrier random number and the composite function card random number which are taken from the authorization carrier before deducting the quota value from the authorization carrier, and performing validity verification on the composite function card identity verification code by using the process key.
The authorization carrier may further include: the identity verification code generation unit is used for calculating the designated secret key by using the random number of the composite function card and the random number of the authorized carrier to generate a process secret key, and calculating the internal information of the authorized carrier by using the process secret key to obtain the identity verification code of the authorized carrier; the authorization carrier identity verification code is used for verifying the identity validity of the authorization carrier by the composite function card.
The authorization carrier may be issued by an authorization center. The authorized carrier can be a rechargeable card, and can also be an ISO7816 series standard and a smart card conforming to the China financial integrated circuit card specification, which supports different encryption algorithms, such as DES, 3-DES, AES.
A fourth embodiment of the present invention provides a terminal device having a structure as shown in FIG. 6, a package
Comprises an acquisition unit and a transmission unit.
An acquisition unit for acquiring transaction data determined according to the characteristic data of the authorized carrier.
And the transmission unit is used for transmitting the transaction data obtained by the acquisition unit to the composite function card for recharging the electronic wallet.
The above-mentioned acquiring unit may further include any one of a first acquiring subunit, a second acquiring subunit, a third acquiring subunit, a fourth acquiring subunit, or a fifth acquiring subunit.
The first obtaining subunit is configured to obtain transaction data input by a user, where the transaction data is determined by an authorization center according to authorized carrier feature data reported by the user and is notified to the user by the authorization center;
the second obtaining subunit is configured to obtain transaction data sent by the authorization center, where the transaction data is determined by the authorization center according to authorization carrier characteristic data reported by a user;
the third acquiring subunit is configured to acquire transaction data input by a user, where the transaction data is determined by an authorization center according to authorized carrier transaction process data reported by the user and is notified to the user; the transaction process data is determined by the authorization carrier according to local characteristic data;
the fourth obtaining subunit is configured to obtain transaction data sent by the authorization center, where the transaction data is determined by the authorization center according to the authorized carrier transaction process data reported by the user; the transaction process data is determined by the authorization carrier according to local characteristic data;
the fifth obtaining subunit is configured to obtain, from the authorization carrier, the transaction data determined by the authorization carrier according to the local feature data.
The obtaining unit may be further configured to receive a notification of completion of the recharging operation of the composite function card.
The acquiring unit may further be configured to acquire an identity verification code of the composite function card, and correspondingly, the transmitting unit may further be configured to transmit the identity verification code of the composite function card to an authorization carrier, so as to implement authentication of the composite function card by the authorization carrier.
The obtaining unit may further be configured to obtain an authentication code of the authorization carrier, and correspondingly, the transmitting unit is further configured to transmit the authentication code of the authorization carrier to the composite function card, so as to implement authentication of the authorization carrier identity by the composite function card, and the specific implementation is the same as that in the first embodiment of the present invention, and is not described here.
The obtaining unit and the transmitting unit may be implemented by the same communication port, and the communication port may be one or more of a usb (universal Serial bus), an mmc (multimedia card) card interface, an sd (secure Digital card) card interface, a smart card interface, and the like.
According to the technical scheme provided by the embodiment of the invention, the transaction data determined according to the characteristic data of the authorization carrier is acquired through the terminal equipment; and recharging the electronic wallet according to the transaction data. Therefore, the embodiment of the invention can enable the user to recharge the electronic wallet under the offline condition, and is not limited to the recharging of the electronic wallet under the online state of the mechanism specified by the authorization center, thereby supporting the safe and flexible recharging mode of the electronic wallet and achieving the purposes of increasing the application selection of an operator and facilitating the use of the user on the premise of ensuring the safety.
In addition, the embodiment of the invention can ensure the safety of recharging operation of the electronic wallet by mutually authenticating the identity between the interactive authorization carrier and the composite function card.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (16)

1. A method for realizing off-line recharging of an electronic wallet is characterized by comprising the following steps:
the method comprises the steps that a composite function card obtains transaction data determined according to feature data of an authorized carrier;
the composite function card charges the electronic wallet according to the transaction data;
and after the transaction data is determined by successfully using the characteristic data of the authorization carrier, invalidating the characteristic data corresponding to the transaction data.
2. The method of claim 1, further comprising:
and the composite function card carries out validity verification on the transaction data and confirms that the validity verification is passed.
3. The method according to claim 1 or 2, wherein the acquiring of the transaction data determined from the characteristic data of the authorized carrier by the composite function card comprises:
acquiring transaction data input by a user through terminal equipment, wherein the transaction data is determined by an authorization center according to authorization carrier characteristic data reported by the user and is notified to the user by the authorization center;
or,
acquiring transaction data sent by an authorization center through terminal equipment, wherein the transaction data is determined by the authorization center according to authorization carrier characteristic data reported by a user and is sent to the terminal equipment by the authorization center; the terminal equipment is determined by the authorization center according to the identification information of the user or the identification information of the terminal equipment reported by the user;
or,
acquiring transaction data input by a user through terminal equipment, wherein the transaction data is determined by an authorization center according to authorization carrier transaction process data reported by the user and is notified to the user by the authorization center, and the transaction process data is determined by an authorization carrier according to local characteristic data;
or,
acquiring transaction data notified by an authorization center through terminal equipment, wherein the transaction data is determined by the authorization center according to authorized carrier transaction process data reported by a user and is sent to the terminal equipment by the authorization center; the transaction process data is determined by the authorization carrier according to local characteristic data; the terminal equipment is determined by the authorization center according to the identification information of the user or the identification information of the terminal equipment reported by the user;
or,
and acquiring the transaction data determined by the authorization carrier according to the local characteristic data from the authorization carrier through the terminal equipment.
4. The method of claim 3, wherein the step of acquiring, by the terminal device, the transaction data determined by the authorization carrier according to the local feature data from the authorization carrier comprises:
and sending an application request to the authorization carrier through the terminal equipment, and obtaining transaction data determined by the authorization carrier according to the local characteristic data according to the response of the authorization carrier.
5. The method of claim 3, wherein invalidating the characteristic data corresponding to the transaction data after successfully determining the transaction data using the characteristic data of the authorized carrier comprises:
after the authorization center successfully uses the characteristic data of the authorization carrier to determine the transaction data, invalidating the characteristic data corresponding to the transaction data;
or,
and after the authorization carrier successfully uses the local characteristic data to determine the transaction data, invalidating the characteristic data corresponding to the transaction data.
6. The method of claim 3, further comprising:
after the authorization center successfully informs the user or the terminal equipment of the transaction data, deducting the transaction data;
or,
and after the authorization carrier successfully transmits the determined transaction data to the terminal equipment, deducting the transaction data.
7. A composite function card, comprising:
the acquisition unit is used for acquiring the transaction data determined according to the characteristic data of the authorized carrier;
the recharging unit is used for recharging the electronic wallet according to the transaction data; and after the transaction data is determined by successfully using the characteristic data of the authorized carrier, invalidating the characteristic data corresponding to the transaction data.
8. A composite function card as recited in claim 7, further comprising:
and the authentication unit is used for carrying out validity verification on the transaction data and triggering the recharging unit to work after the validity verification is confirmed to pass.
9. A composite function card as recited in claim 8, further comprising:
the updating unit is used for updating the error times according to the failure of the current verification when the authentication unit determines that the validity verification fails;
a judging unit for judging whether the number of errors reaches a set threshold;
and the locking unit is used for locking the electronic wallet when the judging unit judges that the error times reach a set threshold value.
10. A composite function card as claimed in claim 7, 8 or 9, wherein said obtaining unit comprises:
the system comprises a first acquisition subunit, a second acquisition subunit and a third acquisition subunit, wherein the first acquisition subunit is used for acquiring transaction data input by a user through terminal equipment, and the transaction data is determined by an authorization center according to authorized carrier characteristic data reported by the user and is notified to the user by the authorization center;
or,
the second acquisition subunit is used for acquiring the transaction data sent by the authorization center through the terminal equipment, wherein the transaction data is determined by the authorization center according to the authorization carrier characteristic data reported by the user and is sent to the terminal equipment by the authorization center; the terminal equipment is determined by the authorization center according to the identification information of the user or the identification information of the terminal equipment reported by the user;
or,
the third acquisition subunit is used for acquiring transaction data input by a user through the terminal equipment, wherein the transaction data are determined by the authorization center according to the authorization carrier transaction process data reported by the user and are notified to the user by the authorization center, and the transaction process data are determined by the authorization carrier according to local characteristic data;
or,
the fourth acquiring subunit is used for acquiring the transaction data sent by the authorization center through the terminal device, wherein the transaction data is determined by the authorization center according to the authorized carrier transaction process data reported by the user and is sent to the terminal device by the authorization center; the transaction process data is determined by the authorization carrier according to local characteristic data; the terminal equipment is determined by the authorization center according to the identification information of the user or the identification information of the terminal equipment reported by the user;
or,
and the fifth acquiring subunit is used for acquiring the transaction data determined by the authorization carrier according to the local characteristic data from the authorization carrier through the terminal device.
11. A composite function card as recited in claim 10, further comprising:
and the notification unit is used for sending a notification of completing the recharging operation to the terminal equipment after completing the recharging of the electronic wallet.
12. An authorization carrier, characterized in that it comprises:
the transaction data determining unit is used for determining transaction data according to local characteristic data;
the transmission unit is used for transmitting the transaction data to the electronic wallet through the terminal equipment for recharging;
the authorization carrier further comprises:
and the data processing unit is used for invalidating the characteristic data corresponding to the transaction data after the transaction data is determined by successfully using the characteristic data of the authorization carrier.
13. The authorization carrier according to claim 12, characterized in that the authorization carrier further comprises:
and the application request processing unit is used for receiving the application request sent by the terminal equipment and triggering the transaction data determining unit to start according to the application request.
14. The authorization carrier according to claim 12, characterized in that the authorization carrier further comprises:
and the deduction unit is used for deducting the transaction data after the determined transaction data is successfully transmitted to the terminal equipment.
15. A terminal device, characterized in that the terminal device comprises:
the acquisition unit is used for acquiring the transaction data determined according to the characteristic data of the authorized carrier;
the transmission unit is used for transmitting the transaction data obtained by the acquisition unit to the composite function card for recharging the electronic wallet; and when the transaction data is successfully determined by using the characteristic data of the authorized carrier, invalidating the characteristic data corresponding to the transaction data.
16. The terminal device according to claim 15, wherein the obtaining unit includes:
the system comprises a first acquisition subunit, a second acquisition subunit and a third acquisition subunit, wherein the first acquisition subunit is used for acquiring transaction data input by a user, and the transaction data is determined by an authorization center according to authorized carrier characteristic data reported by the user and is notified to the user by the authorization center;
or,
the second acquisition subunit is used for acquiring the transaction data sent by the authorization center, wherein the transaction data is determined by the authorization center according to the authorization carrier characteristic data reported by the user;
or,
the third acquisition subunit is used for acquiring transaction data input by a user, wherein the transaction data is determined by an authorization center according to authorized carrier transaction process data reported by the user and is notified to the user; the transaction process data is determined by the authorization carrier according to local characteristic data;
or,
the fourth acquisition subunit is used for acquiring the transaction data sent by the authorization center, wherein the transaction data is determined by the authorization center according to the authorized carrier transaction process data reported by the user; the transaction process data is determined by the authorization carrier according to local characteristic data;
or,
and the fifth acquiring subunit is used for acquiring the transaction data determined by the authorization carrier according to the local characteristic data from the authorization carrier.
CN2008101015901A 2008-03-07 2008-03-07 Method for accomplishing electronic purse off-line charging, complex function card and authorization carrier Active CN101236673B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2008101015901A CN101236673B (en) 2008-03-07 2008-03-07 Method for accomplishing electronic purse off-line charging, complex function card and authorization carrier

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2008101015901A CN101236673B (en) 2008-03-07 2008-03-07 Method for accomplishing electronic purse off-line charging, complex function card and authorization carrier

Publications (2)

Publication Number Publication Date
CN101236673A CN101236673A (en) 2008-08-06
CN101236673B true CN101236673B (en) 2012-08-22

Family

ID=39920263

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2008101015901A Active CN101236673B (en) 2008-03-07 2008-03-07 Method for accomplishing electronic purse off-line charging, complex function card and authorization carrier

Country Status (1)

Country Link
CN (1) CN101236673B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107194697A (en) * 2013-09-18 2017-09-22 腾讯科技(深圳)有限公司 The method and system authorized are provided by mobile terminal

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9378498B2 (en) * 2009-11-20 2016-06-28 Feitian Technologies Co., Ltd Method for loading double e-wallets
CN102404329A (en) * 2011-11-28 2012-04-04 苏州英福迈升信息技术有限公司 Method for validating and encrypting interaction between user terminal and virtual community platform
CN104637195B (en) * 2013-11-12 2017-03-15 中国银联股份有限公司 A kind of IC-card electronic cash off line circle deposit method and system
CN105491028B (en) * 2015-11-25 2019-01-25 四川诚品电子商务有限公司 The identity identifying method of electric business platform account
CN105357213B (en) * 2015-11-25 2018-11-16 四川诚品电子商务有限公司 The identity identifying method of network platform account
CN108091024B (en) * 2018-01-11 2020-03-17 成都千帆科技开发有限公司 Offline control method for access control equipment
CN108848089B (en) * 2018-06-13 2020-09-01 江苏恒宝智能系统技术有限公司 Data encryption method and data transmission system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107194697A (en) * 2013-09-18 2017-09-22 腾讯科技(深圳)有限公司 The method and system authorized are provided by mobile terminal
CN107194697B (en) * 2013-09-18 2019-10-25 腾讯科技(深圳)有限公司 The method and system of authorization are provided by mobile terminal

Also Published As

Publication number Publication date
CN101236673A (en) 2008-08-06

Similar Documents

Publication Publication Date Title
CN101236673B (en) Method for accomplishing electronic purse off-line charging, complex function card and authorization carrier
EP3410376B1 (en) Credit payment method and device based on card emulation of mobile terminal
US20130054473A1 (en) Secure Payment Method, Mobile Device and Secure Payment System
US20130020389A1 (en) Systems and methods for authenticating near field communcation financial transactions
US20090150248A1 (en) System for enhancing payment security, method thereof and payment center
KR101129318B1 (en) Method and system providing lending service using biometrics card
TW201730819A (en) Credit payment method and device based on mobile terminal p2p
JP2003523107A (en) Wireless portable device that can perform various functions with excellent security
WO2001082151A1 (en) External device and authentication system
US20120166344A1 (en) Secure wireless payment system and method thereof
WO2017128974A1 (en) Credit payment method and apparatus based on mobile terminal ese
CN102096972A (en) Method and system for finishing on-line payment based on user terminal, and user terminal
CN103218711B (en) A kind of off-line data interaction process device, system and method
CN101308557A (en) Method for implementing secured electronic charging
JP5086353B2 (en) Improved apparatus and method for purchasing and storing digital content using smart cards
US9792592B2 (en) Portable electronic device for exchanging values and method of using such a device
CN103401277B (en) A kind of intelligent power and utilize this intelligent power to realize the method for mobile payment
CN111052671A (en) System for secure authentication of user identity in an electronic system for banking transactions
CN102892096B (en) System, method, business operation support system (BOSS) and equipment for realizing account recharge
KR20020048926A (en) Settlement method using electronic cash coupled usb connector and rf-chip
KR101505847B1 (en) Method for Validating Alliance Application for Payment
KR101772358B1 (en) Method for Automatic Identifying Other Companies Application for Registration of Payment Means
US20090119214A1 (en) Method and device for exchanging values between personal protable electronic entities
KR100501164B1 (en) System and Method for Authentication/Payment Using Mobile Terminal with Smart Card
KR101216666B1 (en) System and method for recharging prepaid card

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 100015 Beijing city Chaoyang District Dongzhimen West eight Street No. 2 room Wanhong Yan Dong Business Garden

Patentee after: Beijing Watchdata Limited by Share Ltd

Address before: 100015 Beijing city Chaoyang District Dongzhimen West eight Street No. 2 room Wanhong Yan Dong Business Garden

Patentee before: Beijing Woqi Data System Co., Ltd.